<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Fabián BCH.</title>
    <description>The latest articles on DEV Community by Fabián BCH. (@fabianbch).</description>
    <link>https://dev.to/fabianbch</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1202403%2F9a073e31-18d3-4edf-9a25-cf4c81d47c7c.png</url>
      <title>DEV Community: Fabián BCH.</title>
      <link>https://dev.to/fabianbch</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/fabianbch"/>
    <language>en</language>
    <item>
      <title>Identification of cyber threats using Big Data architectures</title>
      <dc:creator>Fabián BCH.</dc:creator>
      <pubDate>Wed, 18 Feb 2026 16:57:08 +0000</pubDate>
      <link>https://dev.to/fabianbch/identification-of-cyber-threats-using-big-data-architectures-1gja</link>
      <guid>https://dev.to/fabianbch/identification-of-cyber-threats-using-big-data-architectures-1gja</guid>
      <description>&lt;p&gt;The massive use of Information and Communication Technologies has led to the interdependence of society with respect to them; added to the absence of efficient and effective controls at a general level, increases the exposure to cyberattacks or threats, to vulnerabilities in the information assets of organizations.&lt;/p&gt;

&lt;p&gt;In this context, this article proposes a data analysis architecture using Big Data tools and security events or logs to improve event identification, integration, and correlation. The research methodology employed was exploratory and descriptive.&lt;/p&gt;

&lt;p&gt;The proposed solution was developed using the Big Data processing phases proposed by Labrinidis and Jagadish, which enable the identification of cyber threats. The designed technological architecture was based on the integration of the Elastic Stack and its main components (Elasticsearch, Logstash, Kibana), and technologies such as Filebeat and Wazuh Security Detection (NIPS/HIDS), managing security across information assets such as communications equipment, data and application servers, database engines, and end-user terminals.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fufjgpa8wpk6ohrdy1c3y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fufjgpa8wpk6ohrdy1c3y.png" alt=" " width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Its implementation would allow for real-time and historical monitoring of an agile and effective response to security alerts and status reports in the event of incidents.&lt;/p&gt;

&lt;p&gt;Although some time has passed, I am sharing with you an abstract of my Master's Thesis (TFM) condensed into an academic paper, published in November 2021 along with professors from the Universidad Tecnológica ECOTEC, proposing a model for identifying threats by applying Big Data architectures.&lt;/p&gt;

&lt;p&gt;INNOVA Research Journal, Universidad Internacional del Ecuador&lt;br&gt;
November 2021, Published scientific article.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://orcid.org/0000-0002-7994-3890" rel="noopener noreferrer"&gt;https://orcid.org/0000-0002-7994-3890&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://revistas.uide.edu.ec/index.php/innova/article/view/1860" rel="noopener noreferrer"&gt;https://revistas.uide.edu.ec/index.php/innova/article/view/1860&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.researchgate.net/publication/356545358_Identificacion_de_amenazas_informaticas_aplicando_arquitecturas_de_Big_Data" rel="noopener noreferrer"&gt;https://www.researchgate.net/publication/356545358_Identificacion_de_amenazas_informaticas_aplicando_arquitecturas_de_Big_Data&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.gworks-ec.com" rel="noopener noreferrer"&gt;https://www.gworks-ec.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>bigdata</category>
      <category>cybersecurity</category>
      <category>siem</category>
      <category>soc</category>
    </item>
    <item>
      <title>Vulnerability management strategy</title>
      <dc:creator>Fabián BCH.</dc:creator>
      <pubDate>Thu, 12 Feb 2026 18:56:54 +0000</pubDate>
      <link>https://dev.to/fabianbch/vulnerability-management-strategy-ml1</link>
      <guid>https://dev.to/fabianbch/vulnerability-management-strategy-ml1</guid>
      <description>&lt;p&gt;Vulnerability management and its respective mitigation are critical aspects in the security of companies, since they allow mitigating the risks to which assets are exposed. To learn about the importance and possible approaches to improve enterprise security posture (SPM), some key criteria are outlined.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj7q128k4v81o7cr11k6i.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj7q128k4v81o7cr11k6i.jpeg" alt=" " width="613" height="361"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Regulatory and/or regulatory compliance:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Organizations, by their nature, must comply with security regulations and vulnerability management, in this sense it is important to comply with regulations or standards such as GDPR (EU), HIPAA, SOX or ISO 27001:2023 and its Annex A, among others.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Recurring security assessments:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It is advisable to execute continuous security assessments and tests, such as penetration tests, adversary emulation and vulnerability scans, allowing the identification of security gaps in the organization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Assets protection:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Vulnerability management helps safeguard confidential data, as well as the organization's critical assets, allowing us to mitigate possible risks such as loss, theft or exfiltration of information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Prioritization and categorization of vulnerabilities:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As part of vulnerability management, it is necessary to categorize, classify and prioritize security breaches according to their criticality and impact on the organization, allowing security teams to focus their efforts on resolving critical and high-level findings, mainly , but without losing sight of the medium and low level.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Implementation of security patches:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Keep technological infrastructure platforms (hardware and software) updated with the latest security patches recommended by different manufacturers, to mitigate at least known vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;- Prevention and identification of cyber threats:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Identifying vulnerabilities early and proactively reduces the possibility of exploitation of gaps by attackers or adversaries (pentesters).&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>management</category>
      <category>security</category>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>Fabián BCH.</dc:creator>
      <pubDate>Mon, 14 Apr 2025 18:58:49 +0000</pubDate>
      <link>https://dev.to/fabianbch/-2h88</link>
      <guid>https://dev.to/fabianbch/-2h88</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/cyb3rcloud8888/entendiendo-los-identificadores-arn-y-aida-en-aws-iam-o45" class="crayons-story__hidden-navigation-link"&gt;Entendiendo los Identificadores ARN y AIDA en AWS IAM&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/cyb3rcloud8888" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1236349%2F60e8f978-f2a6-4a2f-abdc-73cb29164d45.jpg" alt="cyb3rcloud8888 profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/cyb3rcloud8888" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Willie Reyes
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Willie Reyes
                
              
              &lt;div id="story-author-preview-content-2115914" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/cyb3rcloud8888" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1236349%2F60e8f978-f2a6-4a2f-abdc-73cb29164d45.jpg" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Willie Reyes&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/cyb3rcloud8888/entendiendo-los-identificadores-arn-y-aida-en-aws-iam-o45" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Nov 21 '24&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/cyb3rcloud8888/entendiendo-los-identificadores-arn-y-aida-en-aws-iam-o45" id="article-link-2115914"&gt;
          Entendiendo los Identificadores ARN y AIDA en AWS IAM
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/aws"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;aws&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cloudcomputing"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cloudcomputing&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cloudsecurity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cloudsecurity&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
            &lt;a href="https://dev.to/cyb3rcloud8888/entendiendo-los-identificadores-arn-y-aida-en-aws-iam-o45#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            2 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>aws</category>
      <category>cloudcomputing</category>
      <category>cloudsecurity</category>
    </item>
  </channel>
</rss>
